Mapping the pathway to volunteer leadership

Mapping the pathway to volunteer leadership

Mapping the pathway to volunteer leadership | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

A generative AI guidebook was released for CISOs

A generative AI guidebook was released for CISOs

A generative AI guidebook was released for CISOs | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

To Fight Cyber Extortion and Ransomware, Shift Left

To Fight Cyber Extortion and Ransomware, Shift Left

Continue reading the Ransomware Spotlight series: Ransomware is a ‘noisy’ threat. When it hits, there’s no hiding it: attackers lock up systems and issue explicit instructions about what organizations need to do—and pay—to set their data and devices free. That’s why most bad actors engage in cyber extortion only once they’re ready to be exposed, after they’ve already achieved other malicious goals such as exfiltrating data, setting up clandestine command and control structures, or selling…

Read More

Cybersecurity Laws Begin with Federal First

Cybersecurity Laws Begin with Federal First

Intensifying cyberattacks and heightened awareness of the risks they pose is driving the creation of new cybersecurity laws around the world, including in the U.S. at both the federal and state levels. Some of these new measures are sector-specific, others apply more broadly, and all of them add to existing privacy and data protection regimes such as the Health Insurance Portability and Accountability Act (HIPAA) for healthcare, the Gramm-Leach-Bliley Act (GLBA) for financial services, and…

Read More

Strengthening the cyber risk lifecycle

Strengthening the cyber risk lifecycle

Strengthening the cyber risk lifecycle | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

Cyber Threat Intelligence: The Power of Data

Cyber Threat Intelligence: The Power of Data

In an increasingly connected and digital world, cyber threats have emerged as a significant challenge that can jeopardize your organization’s reputation, financial stability, and overall operational efficiency. In fact, according to a 2022 report by IBM, the average cost of a data breach is now $4.35 million. Given the growing prominence and impact of cyber threats, Chief Risk Officers (CRO) need to pay close attention to cyber threat intelligence and its role in enhancing your…

Read More

5 Types of Cyber Crime Groups

5 Types of Cyber Crime Groups

The adage “teamwork makes dreamwork” extends to cybercriminals as well. To launch more successful cyberattacks, malicious actors with different specialized skills have conglomerated to form Cybercrime as a Service (CaaS). We’re now seeing people and groups specialize in various parts of the attack lifecycle. This means that we’re likely going to see less mistakes made leading to detections, and we should expect multiple groups colonizing an infected network. Within CaaS there are five types of…

Read More

Choosing a Hybrid Cloud Security Solution 101

Choosing a Hybrid Cloud Security Solution 101

The accelerated shift to the cloud was mostly borne out of necessity due to the influx of remote workers and changing customer demands requiring more business agility. According to Forrester, 94% of US enterprise infrastructure decision makers are using at least one type of cloud deployment. While there is a push to be cloud-native, the reality is that most companies will keep their “crown jewels” or critical systems on private clouds or on-prem, while leveraging…

Read More

Gaps in agency cybersecurity measures

Gaps in agency cybersecurity measures

Gaps in agency cybersecurity measures | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

Future Proof Your Business from Cybersecurity Threats

Future Proof Your Business from Cybersecurity Threats

In this blog, I’ll share two ways to shift our mindset from reactive to proactive cybersecurity as well as best practices to secure your attack surface against the most common cybersecurity threats. Cybercriminals adopt technologies long after businesses do Many feel that cybersecurity is a cat and mouse game with the threat actors able to constantly thwart the efforts of the cybersecurity community by introducing new tactics, techniques, and procedures (TTPs) whenever they need. It…

Read More
1 3 4 5 6 7 167